HomeIntelligenceBrief
VULNERABILITY BRIEF🔴 Critical Vulnerability

Critical Remote Code Execution in Palo Alto Networks PAN‑OS (CVE‑2026‑0300) Threatens Enterprise Firewalls

Palo Alto Networks disclosed CVE‑2026‑0300, a critical remote code execution flaw in PAN‑OS firewalls. The vulnerability is being actively exploited in the wild, with CISA issuing an emergency directive. Third‑party risk managers must treat this as a high‑impact supply‑chain threat and act quickly.

LiveThreat™ Intelligence · 📅 May 07, 2026· 📰 therecord.media
🔴
Severity
Critical
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
2 sector(s)
Actions
5 recommended
📰
Source
therecord.media

Critical Remote Code Execution in Palo Alto Networks PAN‑OS (CVE‑2026‑0300) Threatens Enterprise Firewalls

What It Is — Palo Alto Networks disclosed a critical flaw (CVE‑2026‑0300) in its PAN‑OS operating system that powers PA‑Series and VM‑Series firewalls. The vulnerability enables unauthenticated remote code execution when authentication portals are exposed to untrusted networks.

Exploitability — Public exploit code appeared on Tuesday; CISA confirmed active exploitation on Wednesday and issued an emergency directive. CVSS v3.1 base score 9.3 (Critical). No patch is yet available; mitigations will be bundled in releases expected within two weeks.

Affected Products — PAN‑OS software, PA‑Series hardware firewalls, VM‑Series virtual firewalls. The issue is triggered by specific configuration settings that expose authentication portals to the internet.

TPRM Impact — The flaw resides in a core security control used by thousands of Fortune 500 enterprises and government agencies. Compromise of a firewall can cascade to downstream vendors, SaaS providers, and cloud workloads, creating a supply‑chain foothold for attackers.

Recommended Actions

  • Immediately apply Palo Alto’s interim mitigations (restrict authentication portals to trusted internal IP ranges).
  • Conduct a rapid inventory of all PAN‑OS devices and verify configuration compliance.
  • Prioritize patch deployment as soon as the May 13 release is available; test in a staging environment first.
  • Review third‑party contracts that rely on Palo Alto firewalls for data protection and update risk registers.
  • Monitor CISA alerts and threat‑intel feeds for exploitation indicators.

Source: The Record – Palo Alto warns of critical software bug used in firewall attacks

📰 Original Source
https://therecord.media/palo-alto-warns-of-critical-software-bug-firewalls

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.